There are 2 open security issues in bookworm.
1 issue left for the package maintainer to handle:
- CVE-2026-27171:
(needs triaging)
zlib before 1.3.2 allows CPU consumption via crc32_combine64 and crc32_combine_gen64 because x2nmodp can do right shifts within a loop that has no termination condition.
You can find information about how to handle this issue in the security team's documentation.
1 ignored issue:
- CVE-2023-45853:
MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product. NOTE: pyminizip through 0.2.6 is also vulnerable because it bundles an affected zlib version, and exposes the applicable MiniZip code through its compress API.